4,706 research outputs found
Context-aware Dynamic Discovery and Configuration of 'Things' in Smart Environments
The Internet of Things (IoT) is a dynamic global information network
consisting of Internet-connected objects, such as RFIDs, sensors, actuators, as
well as other instruments and smart appliances that are becoming an integral
component of the future Internet. Currently, such Internet-connected objects or
`things' outnumber both people and computers connected to the Internet and
their population is expected to grow to 50 billion in the next 5 to 10 years.
To be able to develop IoT applications, such `things' must become dynamically
integrated into emerging information networks supported by architecturally
scalable and economically feasible Internet service delivery models, such as
cloud computing. Achieving such integration through discovery and configuration
of `things' is a challenging task. Towards this end, we propose a Context-Aware
Dynamic Discovery of {Things} (CADDOT) model. We have developed a tool
SmartLink, that is capable of discovering sensors deployed in a particular
location despite their heterogeneity. SmartLink helps to establish the direct
communication between sensor hardware and cloud-based IoT middleware platforms.
We address the challenge of heterogeneity using a plug in architecture. Our
prototype tool is developed on an Android platform. Further, we employ the
Global Sensor Network (GSN) as the IoT middleware for the proof of concept
validation. The significance of the proposed solution is validated using a
test-bed that comprises 52 Arduino-based Libelium sensors.Comment: Big Data and Internet of Things: A Roadmap for Smart Environments,
Studies in Computational Intelligence book series, Springer Berlin
Heidelberg, 201
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
Minimization of Energy and Service Latency Computation Offloading using Neural Network in 5G NOMA System
The future Internet of Things (IoT) era is anticipated to support computation-intensive and time-critical applications using edge computing for mobile (MEC), which is regarded as promising technique. However, the transmitting uplink performance will be highly impacted by the hostile wireless channel, the low bandwidth, and the low transmission power of IoT devices. Using edge computing for mobile (MEC) to offload tasks becomes a crucial technology to reduce service latency for computation-intensive applications and reduce the computational workloads of mobile devices. Under the restrictions of computation latency and cloud computing capacity, our goal is to reduce the overall energy consumption of all users, including transmission energy and local computation energy. In this article, the Deep Q Network Algorithm (DQNA) to deal with the data rates with respect to the user base in different time slots of 5G NOMA network. The DQNA is optimized by considering more number of cell structures like 2, 4, 6 and 8. Therefore, the DQNA provides the optimal distribution of power among all 3 users in the 5G network, which gives the increased data rates. The existing various power distribution algorithms like frequent pattern (FP), weighted least squares mean error weighted least squares mean error (WLSME), and Random Power and Maximal Power allocation are used to justify the proposed DQNA technique. The proposed technique which gives 81.6% more the data rates when increased the cell structure to 8. Thus 25% more in comparison to other algorithms like FP, WLSME Random Power and Maximal Power allocation
Network association strategies for an energy harvesting aided super-wifi network relying on measured solar activity
The super-WiFi network concept has been proposed for nationwide Internet access in the United States. However, the traditional mains power supply is not necessarily ubiquitous in this large-scale wireless network. Furthermore, the non-uniform geographic distribution of both the based-stations and the tele-traffic requires carefully considered user association. Relying on the rapidly developing energy harvesting techniques, we focus our attention on the sophisticated access point (AP) selection strategies conceived for the energy harvesting aided super-WiFi network. Explicitly, we propose a solar radiation model relying on the historical solar activity observation data provided by the University of Queensland, followed by a beneficial radiation parameter estimation method. Furthermore, we formulate both a Markov decision process (MDP) as well as a partially observable MDP (POMDP) for supporting the users’ decisions on beneficially selecting APs. Moreover, we conceive iterative algorithms for implementing our MDP and POMDP-based AP-selection, respectively. Finally, our performance results are benchmarked against a range of traditional decision-making algorithms
Intelligence artificielle à la périphérie du réseau mobile avec efficacité de communication
L'intelligence artificielle (AI) et l'informatique à la périphérie du réseau (EC) ont permis de mettre en place diverses applications intelligentes incluant les maisons intelligentes, la fabrication intelligente, et les villes intelligentes. Ces progrès ont été alimentés principalement par la disponibilité d'un plus grand nombre de données, l'abondance de la puissance de calcul et les progrès de plusieurs techniques de compression. Toutefois, les principales avancées concernent le déploiement de modèles dans les dispositifs connectés. Ces modèles sont préalablement entraînés de manière centralisée. Cette prémisse exige que toutes les données générées par les dispositifs soient envoyées à un serveur centralisé, ce qui pose plusieurs problèmes de confidentialité et crée une surcharge de communication importante. Par conséquent, pour les derniers pas vers l'AI dans EC, il faut également propulser l'apprentissage des modèles ML à la périphérie du réseau.
L'apprentissage fédéré (FL) est apparu comme une technique prometteuse pour l'apprentissage collaboratif de modèles ML sur des dispositifs connectés. Les dispositifs entraînent un modèle partagé sur leurs données stockées localement et ne partagent que les paramètres résultants avec une entité centralisée. Cependant, pour permettre l' utilisation de FL dans les réseaux périphériques sans fil, plusieurs défis hérités de l'AI et de EC doivent être relevés. En particulier, les défis liés à l'hétérogénéité statistique des données à travers les dispositifs ainsi que la rareté et l'hétérogénéité des ressources nécessitent une attention particulière. L'objectif de cette thèse est de proposer des moyens de relever ces défis et d'évaluer le potentiel de la FL dans de futures applications de villes intelligentes.
Dans la première partie de cette thèse, l'accent est mis sur l'incorporation des propriétés des données dans la gestion de la participation des dispositifs dans FL et de l'allocation des ressources. Nous commençons par identifier les mesures de diversité des données qui peuvent être utilisées dans différentes applications. Ensuite, nous concevons un indicateur de diversité permettant de donner plus de priorité aux clients ayant des données plus informatives. Un algorithme itératif est ensuite proposé pour sélectionner conjointement les clients et allouer les ressources de communication. Cet algorithme accélère l'apprentissage et réduit le temps et l'énergie nécessaires. De plus, l'indicateur de diversité proposé est renforcé par un système de réputation pour éviter les clients malveillants, ce qui améliore sa robustesse contre les attaques par empoisonnement des données.
Dans une deuxième partie de cette thèse, nous explorons les moyens de relever d'autres défis liés à la mobilité des clients et au changement de concept dans les distributions de données. De tels défis nécessitent de nouvelles mesures pour être traités. En conséquence, nous concevons un processus basé sur les clusters pour le FL dans les réseaux véhiculaires. Le processus proposé est basé sur la formation minutieuse de clusters pour contourner la congestion de la communication et est capable de traiter différents modèles en parallèle.
Dans la dernière partie de cette thèse, nous démontrons le potentiel de FL dans un cas d'utilisation réel impliquant la prévision à court terme de la puissance électrique dans un réseau intelligent. Nous proposons une architecture permettant l'utilisation de FL pour encourager la collaboration entre les membres de la communauté et nous montrons son importance pour l'entraînement des modèles et la réduction du coût de communication à travers des résultats numériques.Abstract : Artificial intelligence (AI) and Edge computing (EC) have enabled various applications
ranging from smart home, to intelligent manufacturing, and smart cities. This progress
was fueled mainly by the availability of more data, abundance of computing power, and
the progress of several compression techniques. However, the main advances are in relation
to deploying cloud-trained machine learning (ML) models on edge devices. This premise
requires that all data generated by end devices be sent to a centralized server, thus raising
several privacy concerns and creating significant communication overhead. Accordingly,
paving the last mile of AI on EC requires pushing the training of ML models to the
edge of the network. Federated learning (FL) has emerged as a promising technique for
the collaborative training of ML models on edge devices. The devices train a globally
shared model on their locally stored data and only share the resulting parameters with
a centralized entity. However, to enable FL in wireless edge networks, several challenges
inherited from both AI and EC need to be addressed. In particular, challenges related
to the statistical heterogeneity of the data across the devices alongside the scarcity and
the heterogeneity of the resources require particular attention. The goal of this thesis is
to propose ways to address these challenges and to evaluate the potential of FL in future
applications. In the first part of this thesis, the focus is on incorporating the data properties of FL in
handling the participation and resource allocation of devices in FL. We start by identifying
data diversity measures allowing us to evaluate the richness of local datasets in different
applications. Then, we design a diversity indicator allowing us to give more priority to
clients with more informative data. An iterative algorithm is then proposed to jointly select
clients and allocate communication resources. This algorithm accelerates the training
and reduces the overall needed time and energy. Furthermore, the proposed diversity
indicator is reinforced with a reputation system to avoid malicious clients, thus enhancing
its robustness against poisoning attacks. In the second part of this thesis, we explore ways to tackle other challenges related to
the mobility of the clients and concept-shift in data distributions. Such challenges require
new measures to be handled. Accordingly, we design a cluster-based process for FL for the
particular case of vehicular networks. The proposed process is based on careful clusterformation
to bypass the communication bottleneck and is able to handle different models
in parallel. In the last part of this thesis, we demonstrate the potential of FL in a real use-case involving
short-term forecasting of electrical power in smart grid. We propose an architecture
empowered with FL to encourage the collaboration among community members and show
its importance for both training and judicious use of communication resources through
numerical results
- …